<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2022-0059</id>
    <title>An update for sudo is now available for HCE 2.0</title>
    <severity>Critical</severity>
    <release>HCE 2.0</release>
    <issued date="2022-10-08 17:46:41"/>
    <updated date="2022-10-08 17:46:41"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-33070" id="CVE-2022-33070" title="CVE-2022-33070 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-37434" id="CVE-2022-37434" title="CVE-2022-37434 Base Score: 9.8 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2018-25032" id="CVE-2018-25032" title="CVE-2018-25032 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

Protobuf-c v1.4.0 was discovered to contain an invalid arithmetic shift via the function parse_tag_and_wiretype in protobuf-c/protobuf-c.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via unspecified vectors. (CVE-2022-33070)

zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference). (CVE-2022-37434)

zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. (CVE-2018-25032)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="sudo">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="sudo" version="1.9.8p2" release="2.r5.hce2">
          <filename>sudo-1.9.8p2-2.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="sudo-devel" version="1.9.8p2" release="2.r5.hce2">
          <filename>sudo-devel-1.9.8p2-2.r5.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="sudo-help" version="1.9.8p2" release="2.r5.hce2">
          <filename>sudo-help-1.9.8p2-2.r5.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="sudo" version="1.9.8p2" release="2.r5.hce2">
          <filename>sudo-1.9.8p2-2.r5.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="sudo-devel" version="1.9.8p2" release="2.r5.hce2">
          <filename>sudo-devel-1.9.8p2-2.r5.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
